[ 41.726229] audit: type=1800 audit(1555318450.584:30): pid=7636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 47.314928] kauditd_printk_skb: 4 callbacks suppressed [ 47.314950] audit: type=1400 audit(1555318456.204:35): avc: denied { map } for pid=7809 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.156' (ECDSA) to the list of known hosts. 2019/04/15 08:54:22 fuzzer started [ 53.923815] audit: type=1400 audit(1555318462.814:36): avc: denied { map } for pid=7818 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/04/15 08:54:25 dialing manager at 10.128.0.105:36465 2019/04/15 08:54:25 syscalls: 2450 2019/04/15 08:54:25 code coverage: enabled 2019/04/15 08:54:25 comparison tracing: enabled 2019/04/15 08:54:25 extra coverage: extra coverage is not supported by the kernel 2019/04/15 08:54:25 setuid sandbox: enabled 2019/04/15 08:54:25 namespace sandbox: enabled 2019/04/15 08:54:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/15 08:54:25 fault injection: enabled 2019/04/15 08:54:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/15 08:54:25 net packet injection: enabled 2019/04/15 08:54:25 net device setup: enabled 08:56:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000180)=""/11, 0xb) r1 = epoll_create1(0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r3 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000240)) dup2(r0, r3) [ 195.474146] audit: type=1400 audit(1555318604.364:37): avc: denied { map } for pid=7835 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14970 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 195.589209] IPVS: ftp: loaded support on port[0] = 21 08:56:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @local}}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f}}, 0x20) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000180)={0x990000, 0x7, 0x7, [], 0x0}) write(r1, &(0x7f0000000140)="150000000800000000000000c86b6525000010", 0x13) r3 = dup2(r0, r1) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, 0x0, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40000000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9216}]}, 0x44}}, 0x20000000) ioctl$TUNSETOWNER(r3, 0x400454cc, 0x0) [ 195.742394] chnl_net:caif_netlink_parms(): no params data found [ 195.798609] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.806352] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.822515] device bridge_slave_0 entered promiscuous mode [ 195.845224] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.851734] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.868924] device bridge_slave_1 entered promiscuous mode [ 195.900969] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.911514] IPVS: ftp: loaded support on port[0] = 21 [ 195.935694] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:56:44 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0xa423ad41a879dde0) [ 195.971073] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.980473] team0: Port device team_slave_0 added [ 196.005723] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 196.015094] team0: Port device team_slave_1 added [ 196.031075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 196.097968] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 08:56:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='.\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'ipvs\x00'}, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="40c7ce173ab4a8acb40ef27016688bbf9882f9c373507f8ba8129ccc359fb3f6af23255f362386a83897c3cf497bc1a65ec69ff90ba12b0a63269f6c6a6e78ec33003018ef008cf9f417d936c63d8bacc135aaebc2e5ce6a387af1a4228834b9beccee7e9bd49aabd60190ac96c3bcffdf84c105318c54d9c9ec8285eb2f7ce445018f900e4eea62daf1b2dd9242001225d96aa77f5bfacb3c4ac5f856df929026d9ba1dcd9a90", 0xa7) r3 = dup(r2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@dev}}, {{@in=@remote}}}, &(0x7f0000000380)=0xe8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000003c0)=0x7f, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") [ 196.185374] device hsr_slave_0 entered promiscuous mode [ 196.221547] device hsr_slave_1 entered promiscuous mode [ 196.262600] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 196.269695] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 196.307592] IPVS: ftp: loaded support on port[0] = 21 [ 196.319511] chnl_net:caif_netlink_parms(): no params data found [ 196.336294] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.343074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.350023] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.356469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.440212] IPVS: ftp: loaded support on port[0] = 21 [ 196.515228] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.522425] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.529822] device bridge_slave_0 entered promiscuous mode 08:56:45 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x4800) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000140)={0x8001, 0x8001, 0x9875, 0x0, 0x0, [], [], [], 0xfffffffffffffffd, 0x5000000000000000}) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x0, 0x2}, 0x21) [ 196.556344] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.563315] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.570854] device bridge_slave_1 entered promiscuous mode [ 196.589876] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 196.596422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.645245] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.672141] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.724485] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.759506] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 196.769009] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.776573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.788216] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.806062] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.814240] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 08:56:45 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x1, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 196.879181] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 196.889715] team0: Port device team_slave_0 added [ 196.898326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 196.908590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.926567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.934615] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.941006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.996403] IPVS: ftp: loaded support on port[0] = 21 [ 197.006351] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 197.014774] team0: Port device team_slave_1 added [ 197.030091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 197.037479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.045626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.053538] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.059882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.074917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.093414] chnl_net:caif_netlink_parms(): no params data found [ 197.103528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 197.130719] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 197.134439] IPVS: ftp: loaded support on port[0] = 21 [ 197.139573] chnl_net:caif_netlink_parms(): no params data found [ 197.175047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.194513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 197.244374] device hsr_slave_0 entered promiscuous mode [ 197.301616] device hsr_slave_1 entered promiscuous mode [ 197.347578] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 197.360929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.387835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 197.399248] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.413595] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.420034] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.427167] device bridge_slave_0 entered promiscuous mode [ 197.434571] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 197.457490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.465635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.473547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.481685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.489324] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.497522] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.504255] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.511260] device bridge_slave_1 entered promiscuous mode [ 197.538610] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 197.559101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 197.574387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.582292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.590118] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.597499] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.604635] device bridge_slave_0 entered promiscuous mode [ 197.613941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 197.622301] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 197.630004] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 197.648480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.656678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.664944] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.671651] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.678627] device bridge_slave_1 entered promiscuous mode [ 197.732021] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 197.738069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.754917] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 197.763492] team0: Port device team_slave_0 added [ 197.789023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 197.798511] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 197.816243] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 197.824460] team0: Port device team_slave_1 added [ 197.864327] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 197.872302] team0: Port device team_slave_0 added [ 197.880718] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.925559] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 197.934794] team0: Port device team_slave_1 added [ 197.940043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 197.970025] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 197.976692] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.984042] chnl_net:caif_netlink_parms(): no params data found [ 198.033230] device hsr_slave_0 entered promiscuous mode [ 198.071522] device hsr_slave_1 entered promiscuous mode [ 198.121548] chnl_net:caif_netlink_parms(): no params data found [ 198.130636] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 198.137976] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 198.147192] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 198.222813] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.229255] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.236816] device bridge_slave_0 entered promiscuous mode [ 198.243827] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.250189] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.257625] device bridge_slave_1 entered promiscuous mode [ 198.324445] device hsr_slave_0 entered promiscuous mode [ 198.391495] device hsr_slave_1 entered promiscuous mode [ 198.432063] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 198.439211] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 198.455069] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.496738] audit: type=1400 audit(1555318607.384:38): avc: denied { associate } for pid=7836 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 198.501039] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 198.532668] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.539107] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.553914] device bridge_slave_0 entered promiscuous mode [ 198.563125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.569290] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.575795] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.584984] device bridge_slave_1 entered promiscuous mode [ 198.603620] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 198.615364] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 198.627261] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 198.639044] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 198.653445] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 198.680366] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 198.692688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.699690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.708017] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 198.747372] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 198.756557] team0: Port device team_slave_0 added [ 198.763053] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 198.770392] team0: Port device team_slave_1 added [ 198.778129] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 198.786043] team0: Port device team_slave_0 added [ 198.792481] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 198.798550] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.813521] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 198.822052] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 198.829866] team0: Port device team_slave_1 added [ 198.835522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 198.852006] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 198.867349] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 198.875697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 198.918432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.926843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.934565] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.940901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.948320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:56:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), 0x0, 0x2}, 0x20) [ 198.994577] device hsr_slave_0 entered promiscuous mode [ 199.020272] audit: type=1400 audit(1555318607.904:39): avc: denied { map_create } for pid=7864 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 08:56:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000080)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) 08:56:47 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000a00)=@ax25={{0x3, @rose}, [@null, @bcast, @rose, @rose, @netrom, @remote, @rose, @netrom]}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) mlockall(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setparam(0x0, 0x0) mknod(&(0x7f0000000540)='./file0\x00', 0x1041, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x802102201fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) accept(0xffffffffffffffff, &(0x7f0000000b80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c00)=0x80) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'veth1Tto_bond\x00', 0x3802}) close(r0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 199.043092] audit: type=1400 audit(1555318607.904:40): avc: denied { map_read map_write } for pid=7864 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 199.071869] device hsr_slave_1 entered promiscuous mode [ 199.111964] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 199.119221] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 199.149506] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.164164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.175829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 199.243298] device hsr_slave_0 entered promiscuous mode [ 199.281506] device hsr_slave_1 entered promiscuous mode [ 199.321849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.329903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.338317] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.344718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.352295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.362735] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 199.369853] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 199.385255] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 199.393783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.407474] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 199.421006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.440886] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 199.449748] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 199.462023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.468941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.479608] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 199.485919] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.494462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 199.504022] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 199.526033] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 199.532781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.540682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.548676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.556148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.568182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 199.579906] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.587613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.594753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.603473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.611086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.619015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.626676] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.633099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.640598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.652227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 199.659008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.666691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.677060] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 199.683422] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.699365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.709026] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 199.717991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.727215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.735110] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.741521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.748740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.761578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.770010] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.781219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 199.789235] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 199.799067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.807019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.815953] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.822375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.829206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.837235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.845042] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.851441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.858396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.866378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.873939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.892329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 199.903570] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 199.923366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.931733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 08:56:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000d4effc)=0x100, 0x4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @empty}, 0x10) [ 199.948979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 199.958521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 199.990249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 200.005230] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 200.011506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 08:56:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) waitid(0x1, 0x0, 0x0, 0x1000000, 0x0) [ 200.038592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.046568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.063567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.080815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.097531] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 200.106306] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 200.130320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 200.141541] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 08:56:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xcc12, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14, 0x52}}}}]}, 0x48}}, 0x0) [ 200.152189] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.159395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.168104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.177207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.190603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.202108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 200.211631] protocol 88fb is buggy, dev hsr_slave_0 [ 200.216867] protocol 88fb is buggy, dev hsr_slave_1 [ 200.224167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.233513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 200.248861] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.256725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.265590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.273573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.281075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.299540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.302871] hrtimer: interrupt took 43155 ns [ 200.312637] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 200.321125] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 200.335030] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 200.357825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.369238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.377518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.385320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.397924] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 200.406074] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 200.413647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.464428] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 200.470513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.490210] syz-executor.0 (7887) used greatest stack depth: 22784 bytes left 08:56:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xcc12, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14, 0x52}}}}]}, 0x48}}, 0x0) [ 200.511275] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 200.519680] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 200.530650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.537350] protocol 88fb is buggy, dev hsr_slave_0 [ 200.537406] protocol 88fb is buggy, dev hsr_slave_1 [ 200.560972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.574507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.595103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:56:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff09, 0x420ffe0, 0x0, 0x37) [ 200.611314] protocol 88fb is buggy, dev hsr_slave_0 [ 200.616450] protocol 88fb is buggy, dev hsr_slave_1 [ 200.626012] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 200.638447] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 200.651263] protocol 88fb is buggy, dev hsr_slave_0 [ 200.656362] protocol 88fb is buggy, dev hsr_slave_1 [ 200.660918] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.686184] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 200.688391] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 200.726426] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.741417] protocol 88fb is buggy, dev hsr_slave_0 [ 200.746517] protocol 88fb is buggy, dev hsr_slave_1 [ 200.978706] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 200.993303] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.008874] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.016353] syz-executor.0 (7899) used greatest stack depth: 22464 bytes left [ 201.030823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.039566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.055034] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.061646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.069764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.077810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.085414] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.091820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.100768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.108435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.121575] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.130789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.155977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.164720] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.172424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.180227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.188248] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.194639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.201661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.209377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.217073] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.223460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.232739] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 201.242172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 201.261371] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 201.270826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 201.278415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.289637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.297559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.305354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.316105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 201.326602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 201.337335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.346682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.354545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.362730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.370472] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.377705] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.403482] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 201.413597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 201.436361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.462146] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.480995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.489665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.506055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 201.517411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.525740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.536794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 201.547736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 201.556964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.566513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.572256] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 201.576073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.603122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.622170] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 201.630340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.646139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 201.658985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 08:56:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001700010100000000000000000400000050ee3de8184bf507db6c5ccaadcaffd94fb38e5c30183f"], 0x1}}, 0x0) [ 201.666896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.679099] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 201.687328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.718867] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 201.734173] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 201.747005] audit: type=1400 audit(1555318610.634:41): avc: denied { create } for pid=7915 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 201.772824] audit: type=1400 audit(1555318610.634:42): avc: denied { write } for pid=7915 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 201.786492] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.820882] 8021q: adding VLAN 0 to HW filter on device batadv0 08:56:51 executing program 3: r0 = socket$inet(0x2, 0x20000002, 0x0) sendmsg(r0, &(0x7f00000026c0)={&(0x7f0000000080)=@in, 0xc, 0x0, 0x0, &(0x7f0000002600)=[{0x98, 0x0, 0x5, "34bb0b2a2ba913cd5fec3ebc742cb977c34b61c2433a0aa64504a6e5260b8432b19d509346e4369e53f6c3e01265660dd5552f5fbbe24628b1604ffb805fefe9afc6d5c729384ba1b791a9fccfe89af792e6c6474c34879bc2334c81b4d909f5b457b272a79d26de0865c2caf7a3a447cc543e9d36b884ee2ad90c87d66af0108203"}], 0x98}, 0x404) 08:56:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) shutdown(r0, 0x1) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x420ffe0, 0x0, 0x0) 08:56:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff09, 0x420ffe0, 0x0, 0x37) 08:56:51 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000a80)={0x3, 0x0, [{0x0, 0x0, 0x0}, {0x4000, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) 08:56:51 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x2, @link_local, 'ip6gre0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x255, 0x0) 08:56:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) [ 202.415795] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:56:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x3, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x104) 08:56:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sched_setattr(0x0, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000140)={0x20}, 0x20) 08:56:51 executing program 5: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000500)) dup2(r0, r1) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000280)={{0x2, 0x0, @multicast1}, {0x7, @remote}, 0x8, {0x2, 0x0, @empty}, 'ip6gre0\x00'}) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x0) 08:56:51 executing program 3: openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001700010100000000000000000400000050ee3de8184bf507db6c5ccaadcaffd94fb38e5c30183f"], 0x1}}, 0x0) 08:56:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/udp6\x00') read$rfkill(r1, 0x0, 0x0) 08:56:51 executing program 0: r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = gettid() clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) ptrace(0x10, r2) wait4(0x0, 0x0, 0x0, 0x0) 08:56:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff09, 0x420ffe0, 0x0, 0x37) 08:56:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x13fc) 08:56:51 executing program 2: getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000480), &(0x7f0000000400)=0x32) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000180), &(0x7f00000001c0)=0xc) preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000080)=""/120, 0x78}, {&(0x7f0000001680)=""/4096, 0x1000}], 0x2, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x615, 0x0) pwritev(r0, &(0x7f00000015c0)=[{&(0x7f0000000000)="f91b664cdf875e5a3ce90a76457592ad54450aef7d4bf01d16c4a82789c38b00a47e419318ffd0d4f3647f97818bdf99a6a122", 0x33}], 0x1, 0x0) pwritev(r0, &(0x7f00000003c0), 0x273, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) r1 = semget(0x2, 0x3, 0x0) semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f0000000200)=""/179) [ 202.864248] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 08:56:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = dup(r1) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)) 08:56:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd0") perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, &(0x7f0000d83ff8), 0x2008000fffffffe) 08:56:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @local}, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write(r1, &(0x7f0000000140)="150000000800000000000000c86b6525000010", 0x13) dup2(r0, r1) geteuid() 08:56:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff09, 0x420ffe0, 0x0, 0x37) 08:56:52 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000380)='hfsplus\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@session={'session'}}]}) [ 203.294733] hfsplus: invalid session number or type of track [ 203.319537] hfsplus: unable to find HFS+ superblock [ 203.364974] hfsplus: invalid session number or type of track [ 203.380197] hfsplus: unable to find HFS+ superblock 08:56:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000200)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") r3 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f0000000380)='`', 0x1) ptrace$setregs(0xf, r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000080)) ptrace$setregset(0x4205, r2, 0x2, &(0x7f0000000180)={0x0}) 08:56:52 executing program 0: getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) accept$unix(0xffffffffffffff9c, 0x0, 0x0) clone(0x70024100, &(0x7f0000000a00), 0x0, 0x0, 0x0) 08:56:52 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) waitid(0x1, 0x0, 0x0, 0x1000000, &(0x7f0000000140)) 08:56:52 executing program 2: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) mkdirat(0xffffffffffffff9c, 0x0, 0x0) memfd_create(0x0, 0x0) 08:56:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff09, 0x420ffe0, 0x0, 0x37) 08:56:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff09, 0x420ffe0, 0x0, 0x37) [ 203.675828] audit: type=1400 audit(1555318612.524:43): avc: denied { sys_admin } for pid=8022 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 08:56:52 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mlockall(0x6) 08:56:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=40000000000']) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) [ 203.773681] audit: type=1400 audit(1555318612.644:44): avc: denied { map } for pid=8027 comm="syz-executor.5" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=27531 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 203.943649] hugetlbfs: Bad value '40000000000' for mount option 'mode=40000000000' [ 203.959126] audit: type=1800 audit(1555318612.844:45): pid=8045 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16529 res=0 [ 203.975368] IPVS: ftp: loaded support on port[0] = 21 [ 203.999801] hugetlbfs: Bad value '40000000000' for mount option 'mode=40000000000' 08:56:52 executing program 4: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 08:56:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff09, 0x420ffe0, 0x0, 0x37) 08:56:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000004080513f14d11fffdffff010a0000000c00030084ffffff7d0a00b60c0002000002fa17711104a6"], 0x2c}}, 0x0) 08:56:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000004080513f14d11fffdffff010a0000000c000300060000007d0a00b60c0002000002fa17711104a6"], 0x2c}}, 0x0) [ 204.172023] audit: type=1400 audit(1555318613.064:46): avc: denied { create } for pid=8051 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 204.212568] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 204.238379] mmap: syz-executor.4 (8057) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 204.246240] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 204.295395] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 204.323819] audit: type=1400 audit(1555318613.094:47): avc: denied { write } for pid=8051 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 204.359624] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 204.382806] kasan: CONFIG_KASAN_INLINE enabled [ 204.402688] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 204.450400] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 204.456693] CPU: 1 PID: 8053 Comm: syz-executor.3 Not tainted 4.19.34 #2 [ 204.463533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.472909] RIP: 0010:sctp_timeout_obj_to_nlattr+0x96/0x170 [ 204.478637] Code: f3 65 48 8b 14 25 28 00 00 00 48 89 55 d0 31 d2 48 89 85 70 ff ff ff e8 b8 cd d3 fb 48 8b 8d 70 ff ff ff 48 89 d8 48 c1 e8 03 <0f> b6 14 08 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 a3 [ 204.497542] RSP: 0018:ffff88805d0d73c8 EFLAGS: 00010247 [ 204.500697] kobject: 'tunl0' (00000000bbf4ce17): kobject_add_internal: parent: 'net', set: 'devices' [ 204.502910] RAX: 0000000000000000 RBX: 0000000000000004 RCX: dffffc0000000000 [ 204.502919] RDX: 0000000000040000 RSI: ffffffff85976988 RDI: 1ffff1100ba1ae7b [ 204.502939] RBP: ffff88805d0d7460 R08: ffff88805d0ca600 R09: ffff88805d1962a8 [ 204.502948] R10: ffffed100ba32c54 R11: ffff88805d1962a0 R12: ffffffff87e13780 [ 204.502957] R13: 0000000000000001 R14: ffff888093e04a40 R15: ffff88805d0d7438 [ 204.502980] FS: 00007f20ecd71700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 204.522295] kobject: 'tunl0' (00000000bbf4ce17): kobject_uevent_env [ 204.526776] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 204.526785] CR2: 0000000000000000 CR3: 000000009f594000 CR4: 00000000001406e0 [ 204.526798] Call Trace: [ 204.534387] kobject: 'tunl0' (00000000bbf4ce17): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 204.541339] ? sctp_timeout_nlattr_to_obj+0x240/0x240 [ 204.541354] ? __nla_put+0x37/0x40 [ 204.541369] ? nla_put+0x116/0x150 [ 204.541389] cttimeout_default_get+0x69a/0xa80 [ 204.549499] kobject: 'queues' (000000008191d436): kobject_add_internal: parent: 'tunl0', set: '' [ 204.556878] ? cttimeout_del_timeout+0x1a0/0x1a0 [ 204.556894] ? __lock_is_held+0xf4/0x140 [ 204.556913] ? cttimeout_del_timeout+0x1a0/0x1a0 [ 204.556945] nfnetlink_rcv_msg+0xd12/0xfe0 [ 204.563652] kobject: 'queues' (000000008191d436): kobject_uevent_env [ 204.569230] ? nfnetlink_bind+0x2d0/0x2d0 [ 204.569251] ? avc_has_extended_perms+0x10f0/0x10f0 [ 204.576563] kobject: 'queues' (000000008191d436): kobject_uevent_env: filter function caused the event to drop! [ 204.579087] ? __dev_queue_xmit+0x1764/0x3020 [ 204.579110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.588706] kobject: 'rx-0' (0000000057142d2b): kobject_add_internal: parent: 'queues', set: 'queues' [ 204.593550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.593568] ? cred_has_capability+0x193/0x320 [ 204.593585] ? selinux_ipv4_output+0x50/0x50 [ 204.593605] ? __sanitizer_cov_trace_cmp1+0x3/0x20 [ 204.597921] kobject: 'rx-0' (0000000057142d2b): kobject_uevent_env [ 204.600683] netlink_rcv_skb+0x180/0x460 [ 204.600711] ? nfnetlink_bind+0x2d0/0x2d0 [ 204.600727] ? netlink_ack+0xb60/0xb60 [ 204.600743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.600763] ? ns_capable+0x23/0x30 [ 204.605633] kobject: 'rx-0' (0000000057142d2b): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 204.614770] ? __netlink_ns_capable+0x104/0x140 [ 204.614786] nfnetlink_rcv+0x1c0/0x460 [ 204.614800] ? nfnetlink_rcv_batch+0x1770/0x1770 [ 204.614824] ? netlink_deliver_tap+0x254/0xc20 [ 204.620495] kobject: 'tx-0' (00000000d444b9e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 204.623627] netlink_unicast+0x53c/0x720 [ 204.623644] ? netlink_attachskb+0x770/0x770 [ 204.623664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.623684] netlink_sendmsg+0x8ae/0xd70 [ 204.630534] kobject: 'tx-0' (00000000d444b9e9): kobject_uevent_env [ 204.632661] ? netlink_unicast+0x720/0x720 [ 204.632680] ? selinux_socket_sendmsg+0x36/0x40 [ 204.632696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.632714] ? security_socket_sendmsg+0x93/0xc0 [ 204.639565] kobject: 'tx-0' (00000000d444b9e9): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 204.643336] ? netlink_unicast+0x720/0x720 [ 204.643350] sock_sendmsg+0xdd/0x130 [ 204.643375] ___sys_sendmsg+0x806/0x930 [ 204.655356] kobject: 'gre0' (00000000fa351d43): kobject_add_internal: parent: 'net', set: 'devices' [ 204.658615] ? copy_msghdr_from_user+0x430/0x430 [ 204.658638] ? lock_downgrade+0x810/0x810 [ 204.673055] kobject: 'gre0' (00000000fa351d43): kobject_uevent_env [ 204.678005] ? kasan_check_read+0x11/0x20 [ 204.678032] ? __fget+0x367/0x540 [ 204.683896] kobject: 'gre0' (00000000fa351d43): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 204.688137] ? iterate_fd+0x360/0x360 [ 204.688158] ? lock_downgrade+0x810/0x810 [ 204.693376] kobject: 'queues' (00000000b084b14b): kobject_add_internal: parent: 'gre0', set: '' [ 204.697477] ? __fget_light+0x1a9/0x230 [ 204.697496] ? __fdget+0x1b/0x20 [ 204.704153] kobject: 'queues' (00000000b084b14b): kobject_uevent_env [ 204.707849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 204.707868] __sys_sendmsg+0x105/0x1d0 [ 204.712055] kobject: 'queues' (00000000b084b14b): kobject_uevent_env: filter function caused the event to drop! [ 204.715882] ? __ia32_sys_shutdown+0x80/0x80 [ 204.715906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.715925] ? do_syscall_64+0x26/0x610 [ 204.721676] kobject: 'rx-0' (00000000a8ef39f0): kobject_add_internal: parent: 'queues', set: 'queues' [ 204.725079] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.725094] ? do_syscall_64+0x26/0x610 [ 204.725113] __x64_sys_sendmsg+0x78/0xb0 [ 204.736154] kobject: 'rx-0' (00000000a8ef39f0): kobject_uevent_env [ 204.739992] do_syscall_64+0x103/0x610 [ 204.740017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.744196] kobject: 'rx-0' (00000000a8ef39f0): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 204.748638] RIP: 0033:0x458c29 [ 204.748655] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.748662] RSP: 002b:00007f20ecd70c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 204.748682] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 204.754056] kobject: 'tx-0' (000000001ac53e7c): kobject_add_internal: parent: 'queues', set: 'queues' [ 204.762592] RDX: 0000000000000000 RSI: 0000000020dddfc8 RDI: 0000000000000004 [ 204.762599] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 204.762607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20ecd716d4 [ 204.762615] R13: 00000000004c6501 R14: 00000000004dae68 R15: 00000000ffffffff [ 204.762636] Modules linked in: [ 204.768755] kobject: 'tx-0' (000000001ac53e7c): kobject_uevent_env [ 204.781870] ---[ end trace 326fb1a3fc036478 ]--- [ 204.791313] kobject: 'tx-0' (000000001ac53e7c): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 204.797344] RIP: 0010:sctp_timeout_obj_to_nlattr+0x96/0x170 [ 205.012176] kobject: 'gretap0' (0000000003ff6314): kobject_add_internal: parent: 'net', set: 'devices' [ 205.117661] kobject: 'gretap0' (0000000003ff6314): kobject_uevent_env [ 205.120051] Code: f3 65 48 8b 14 25 28 00 00 00 48 89 55 d0 31 d2 48 89 85 70 ff ff ff e8 b8 cd d3 fb 48 8b 8d 70 ff ff ff 48 89 d8 48 c1 e8 03 <0f> b6 14 08 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 a3 [ 205.124987] kobject: 'gretap0' (0000000003ff6314): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 205.147422] RSP: 0018:ffff88805d0d73c8 EFLAGS: 00010247 [ 205.158021] kobject: 'queues' (00000000fa82aa64): kobject_add_internal: parent: 'gretap0', set: '' [ 205.158351] kobject: 'loop4' (000000007b2fc763): kobject_uevent_env [ 205.164146] kobject: 'queues' (00000000fa82aa64): kobject_uevent_env [ 205.181703] kobject: 'queues' (00000000fa82aa64): kobject_uevent_env: filter function caused the event to drop! [ 205.187902] RAX: 0000000000000000 RBX: 0000000000000004 RCX: dffffc0000000000 [ 205.198794] kobject: 'rx-0' (00000000f817a6aa): kobject_add_internal: parent: 'queues', set: 'queues' [ 205.207917] kobject: 'loop4' (000000007b2fc763): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 205.216622] kobject: 'rx-0' (00000000f817a6aa): kobject_uevent_env [ 205.227358] RDX: 0000000000040000 RSI: ffffffff85976988 RDI: 1ffff1100ba1ae7b [ 205.232395] kobject: 'rx-0' (00000000f817a6aa): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 205.246636] RBP: ffff88805d0d7460 R08: ffff88805d0ca600 R09: ffff88805d1962a8 [ 205.256437] R10: ffffed100ba32c54 R11: ffff88805d1962a0 R12: ffffffff87e13780 [ 205.257612] kobject: 'tx-0' (000000009322255a): kobject_add_internal: parent: 'queues', set: 'queues' [ 205.266393] R13: 0000000000000001 R14: ffff888093e04a40 R15: ffff88805d0d7438 [ 205.266406] FS: 00007f20ecd71700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 205.266416] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 205.266425] CR2: 00007fe3bda22518 CR3: 000000009f594000 CR4: 00000000001406e0 [ 205.266437] Kernel panic - not syncing: Fatal exception [ 205.267209] Kernel Offset: disabled [ 205.314312] Rebooting in 86400 seconds..